Explore chapters and articles related to this topic
Modern Predictive Analytics and Big Data Systems Engineering
Published in Anna M. Doro-on, Handbook of Systems Engineering and Risk Management in Control Systems, Communication, Space Technology, Missile, Security and Defense Operations, 2023
Many modern applications involve collecting large amounts of data from multiple sources, and then aggregating and manipulating it in intricate ways (Ainy et al. 2016). The complexity of such applications, combined with the size of the collected data, makes it difficult to understand the application logic and how information was derived (Ainy et al. 2016). Data provenance has been proven helpful in this respect in different contexts; however, maintaining and presenting the full and exact provenance may be infeasible, due to its size and complex structure (Ainy et al. 2016). Depending on the application domain, different properties of the object can be tracked such as owner information, purpose of its creation, processes undergone, state of the object or material at each stage (Wang et al. 2012). Hence, provenance allows to verify the quality of information in a data store, to repeat manipulation steps, and to discover dependencies among data items in a data store (Thuraisingham et al. 2014). The utility of shared information relies on (1) the quality of the source of information and (2) the reliability and accuracy of the mechanisms (i.e., procedures and algorithms) used at each step of the modification (or transformation) of the underlying data items (Thuraisingham et al. 2014). Furthermore, provenance is a key component for the verification and correctness of a data item, which is usually stored and then shared with information users (Thuraisingham et al. 2014).
Functional Architectures for Knowledge Authentication and Provenance
Published in Denise Bedford, Knowledge Architectures, 2020
Chain of custody is often referred to as provenance outside the legal and business environments. Provenance is defined as the chronology of ownership, custody, or location of an object, document, or group of documents over its full history. The primary purpose of tracing the provenance of an object or entity is to provide contextual and circumstantial evidence for its original production or discovery, by establishing, as far as practicable, its later history, especially the sequences of its formal ownership, custody, and places of storage. Having detailed evidence of provenance can establish that an asset is what it purports to be, that it has not been altered or stolen and is not a forgery. Moral and legal validity of a chain of custody is important where forgeries, fakes, and reproductions are common in cases of theft, misappropriation, or ‘looted’ assets (Bubandt, 2009; Carter, 2007; Craddock, 2009; Graham, 2007; Hamilton, 1996; Karlen, 1986; Lee & Yoo, 2009; Lenain, 2014; Li, 2013; Marston & Watts, 2003; Mathews, 2015; Mills & Mansfield, 1979; Olson et al., 2007; Parker, 2018; Pennycook, 1996; Rusanov et al., 1993; Sanchirico, 2003; Savage, 1963; Shao et al., 2017; Shu et al., 2017; Spilsbury, 2009; Spink & Levente Fejes, 2012; Stalnaker, 2005; Tandoc et al., 2018).
Socialising Decision Enactment: Living Provenance in Decision Support
Published in Frédéric Adam, Dorota Kuchta, Stanisław Stanek, Frédéric Adam, Joanna Iwko, Gaye Kiely, Dorota Kuchta, Ewa Marchwicka, Stephen McCarthy, Gloria Phillips-Wren, Stanisław Stanek, Tadeusz Trzaskalik, Irem Ucal Sari, Rational Decisions in Organisations, 2022
At the technical level, these multisided platforms integrate the World Wide Web Consortium’s provenance ontology (PROV-O) for the representation of transaction data (Moreau and Groth, 2013) and distributed-ledger technology (Rauchs et al., 2018) to provide a comprehensive transaction-processing system that explores, assesses, and validates the provenance of all the entities transacted in accord with the W3C's Provenance standard and stores the verified transaction records transparently and immutably in a permissioned blockchain (Lyons and Courcelas, 2019), guaranteeing transparency, accessibility, and verification throughout the ecosystem.
Data provenance collection and security in a distributed environment: a survey
Published in International Journal of Computers and Applications, 2021
Wolali Ametepe, Changda Wang, Selasi Kwame Ocansey, Xiaowei Li, Fida Hussain
Distributed computing environment does not only provide flexibility of communication but also mitigates management and IT infrastructural costs. It raises safety challenges of keeping the confidentiality of the data. Therefore, distributed computing users might not have faith in their service provider that stores their data in isolated geographical localities. The great concern for distributed computing users is the data security which is an obstacle in adopting distributed computing services especially for most of those tasks with sensitive data in banking and healthcare environment. Unfortunately, distributed computing infrastructures such as cloud computing are lacking data provenance management so far. Provenance shows how a peculiar piece of data is produced or generated. As soon as the data are processed the provenance is generated. Data provenance is one of the key elements that reflect the information quality. Provenance defines the history of the derivation of the data items. Provenance involves tracing the source of an information and the subsequent changes performed on it. Hasan et al. [13] were among the first to define the secure provenance problem and argued that it is of vital importance in numerous applications. They emphasized the protection of the contents of provenance records. The data provenance plays an important role in the forensic analysis by providing a digital proof for investigation. Usually, provenance considers who performed an action, where, and when an action occurs on the data [14].
Lightweight Intuitive Provenance (LiP) in a distributed computing environment
Published in International Journal of Computers and Applications, 2019
Wolali Ametepe, Changda Wang, Selasi Kwame Ocansey, XiaWei Li
Capturing and usage of provenance is a way of reasoning about the origin of data which has currently become a research area in computing [11]. To this venture, many seminal efforts taken by studies such as: Burrito [12], PASS [13], and StoryBook [14] lay emphasis on augmenting data provenance the existing systems to back derivation to be well accepted. Unlike these proof-of-concepts, provenance systems need to demonstrate that they are able to be captured, utilize and retrofit data provenance for valuable purposes. We realized that one of the main hindrances for adopting provenance nowadays is lack of awareness. Many research papers also focused on handling data provenance information [15], though security of provenance which provides the trust for the data provenance has been stated as a major issue [16,17]. Providing the security for provenance implies confidentiality, integrity, and availability of provenance [17]. Im and Heon [18] proposed a security guarantee for provenance in e-science environment. Since data provenance summarizes the history of actions made on the data, its volume increases almost every time [19]. In this regard, there are lightweight provenance schemes which were developed for detecting packet drop attacks and forgery in wireless networks environment.
Blockchain for Cybersecurity: Systematic Literature Review and Classification
Published in Journal of Computer Information Systems, 2022
Marina Liu, William Yeoh, Frank Jiang, Kim-Kwang Raymond Choo
Data provenance is significant for determining data quality, data reliability, data reusability, and digital forensics. Liang et al.70 developed a cloud data provenance architecture based on blockchain technology. This framework not only enables the transparency of data accountability but also enhances the privacy and availability of provenance data. According to Neisse et al.,72 data can be tracked in the cloud as they travel between the data center and the user by allowing users to register their data on the blockchain. In addition, the data are recorded and validated in the blockchain.